Tuesday, July 25, 2023

- Cisco packet tracer manual pdf download

Looking for:

Packet Tracer Lab - . 













































   

 

Cisco packet tracer manual pdf download -



 

Set the encapsulation to PPP and activate the serial interface. CustomerRouter config-if encapsulation ppp CustomerRouter config-if no shutdown f. Enter the end command to return to privileged EXEC mode. Another command used to verify the IP addressing and encapsulation is show interface. Step 1: Configure the switch host name. From the Customer PC, use a console cable and terminal emulation software to connect to the console of the customer Cisco Catalyst switch.

Set the host name on the switch to CustomerSwitch using these commands. From global configuration mode, configure the password as cisco. CustomerSwitch config enable password cisco b. From global configuration mode, configure the secret as cisco CustomerSwitch config enable secret cisco Step 3: Configure the console password.

From global configuration mode, switch to configuration mode to configure the console line. CustomerSwitch config line console 0 b. From line configuration mode, set the password to cisco and require the password to be entered at login.

CustomerSwitch config-line password cisco CustomerSwitch config-line login CustomerSwitch config-line exit Step 4: Configure the vty password. From global configuration mode, switch to the configuration mode for the vty lines 0 through CustomerSwitch config line vty 0 15 b.

CustomerSwitch config interface vlan 1 CustomerSwitch config-if ip address From global configuration mode, assign the default gateway to CustomerSwitch config ip default-gateway Step 7: Verify the configuration. The first one or two pings may fail while ARP converges. CustomerSwitch config end CustomerSwitch ping What command is necessary to enforce password authentication on the console and vty lines?

How many gigabit ports are available on the Cisco Catalyst switch that you used in the activity? The switch is already configured with all the basic necessary information for connecting to the LAN at the customer site. The switch is currently not connected to the network. You will connect the switch to the customer workstation, the customer server, and customer router. You will verify that the switch has been connected and configured successfully by pinging the LAN interface of the customer router.

Step 1: Connect the switch to the LAN. Step 2: Verify the switch configuration. From the Customer PC, use the terminal emulation software to connect to the console of the customer Cisco Catalyst switch.

Use the console connection and terminal utility on the Customer PC to verify the configurations. Use cisco as the console password. Enter privileged EXEC mode and use the show running-config command to verify the following configurations.

The password is cisco Verify IP connectivity between the Cisco Catalyst switch and the Cisco router by initiating a ping to What is the significance of the enable secret command compared to the enable password? If you want to remove the requirement to enter a password to access the console, what commands do you issue from your starting point in privileged EXEC mode? Because CDP operates at Layer 2, only directly connected devices exchange information.

Step 1: View CDP configuration settings. On router R1, issue the show cdp command. The output shows timer and version information. Issue the show cdp? Issue the show cdp interface command. The output shows timer information for all the interfaces on the router. You can specify a particular interface to show timer information for that interface only. Step 2: View CDP neighbor information.

A router builds a table of information about neighboring devices from CDP messages received from those devices. On router R1, issue the show cdp neighbors command. Packet Tracer operates in real time, like actual network equipment. If you do not see two entries in the output of the command, wait a couple of minutes and reissue the command until you do.

Examine the output. A single line of information is displayed for each device. Information is displayed for switch S1 and router R2, which are directly connected, but not for router R3, which is not directly connected.

Issue the show cdp entry R2 command. More detailed information about router R2 is displayed, including the IP address used to reach the router. Detailed information about all directly connected devices is displayed.

Issue the show cdp neighbors detail command. Step 3: Disable and enable CDP globally on a router. On router R2, issue the show cdp neighbors command. The output shows information about the three directly connected devices. Issue the no cdp run command to disable CDP on the router. Exit configuration mode and issue the show cdp neighbors command.

The output shows that CDP is not enabled. If the output shows an entry for R2, wait the number of seconds shown for the Holdtime entry on R2, and then reissue the command. The entry for R2 will no longer be shown because no CDP messages were received before the Holdtime expired. On router R2, enter global configuration mode. Issue the cdp run command to enable CDP on the router. Step 4: Disable and enable CDP on an interface.

You may not want to send CDP information to Cisco devices on an untrusted network. It is possible to disable CDP on a specific interface. Exit configuration mode. Reflection You now have a basic understanding of CDP. Write down some issues and considerations to discuss with your classmates about CDP.

Each device in this network has been configured with IP addresses; however, no routing has been configured. The company management wants to use static routes to connect the multiple networks.

Step 1: Test connectivity between the PCs and the default gateway. To determine if there is connectivity from each PC to its configured gateway, first use a simple ping test. From the command prompt, type the ipconfig command. Note the IP address for BOpc and the default gateway address. Ping This ping should be successful. Note the IP address for PNpc and the default gateway address. Each of these ping tests should be successful. Step 2: Ping between routers to test connectivity. Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.

Test connectivity with MainOffice by pinging This ping should succeed. This ping should fail. Issue the show ip route command from the terminal window of BOpc.

Note that only directly connected routes are shown in the BranchOffice routing table. The ping to Repeat steps a through d on the other two PCs. The pings to directly connected networks will succeed. However, pings to remote networks will fail. What steps must be taken to reach all the networks from any PC in the activity? Step 3: Viewing the routing tables.

You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is in the Common Tools bar to the right of the topology. The Inspect tool is the icon that appears as a magnifying glass. In the Common Tools bar, click on the Inspect tool. Click the MainOffice router and choose Routing Table. Click the BranchOffice router and choose Routing Table. Click the PartnerNet router and choose Routing Table.

Move the routing table windows around so that you can see all three at once. What networks do each of the routers already know about?

Does each router know how to route to all networks in the topology? After comparing the routing tables, close the window for each routing table by clicking the x in the upper right corner of each window. To configure static routes for each router, first determine which routes need to be added for each device. For the BranchOffice and the PartnerNet routers, a single default route allows these devices to route traffic for all networks not directly connected. To configure a default route, you must identify the IP address of the next hop router, which in this case is the MainOffice router.

From the Common toolbar, click the Select tool. Move the cursor over the red serial link between the BranchOffice router and the MainOffice router. Move the cursor over the red serial link between the PartnerNet router and the MainOffice router. At the BranchOffice prompt, type configure terminal. The syntax for a default route is ip route 0. Type ip route 0. Type end to get back to the BranchOffice prompt. Type copy run start to save the configuration change.

Repeat steps f through k on the PartnerNet router, using Step 5: Configure static routes at Main Office. The MainOffice router knows only about routes to the Static routes to the At the MainOffice prompt, type configure terminal.

Type end to return to the MainOffice prompt. Repeat steps a through e from Step 3. View the routing tables and notice the difference in the routing tables.

Step 6: Test connectivity. Now that each router in the topology has static routes configured, all hosts should have connectivity to all other hosts. Use ping to verify connectivity. Click BOpc and click the Desktop tab. Choose the Command prompt option.

The ping should be successful, verifying that the static routes are configured properly. Notice that the result is successful even though you did not specifically add the Because a default route was used on the BranchOffice and PartnerNet routers, a route for the The default route sends all traffic destined off network to the MainOffice router. The In this activity, you will configure RIP across the network and set up end devices to communicate on the network.

Set the clock rate at Using the no shutdown command, enable the configured interfaces. Configure RIP to advertise the networks for the configured interfaces. Configure the end devices. Specify the appropriate default gateway and subnet mask. At the command prompt for each router, issue the commands show ip protocols and show ip route to verify RIP routing is fully converged.

The show ip protocols command displays the networks the router is advertising and the addresses of other RIP routing neighbors. Every device should now be able to successfully ping any other device in this activity. The business has grown and includes a research and development department working on a new, very confidential project.

The livelihood of the project depends on protecting the data used by the research and development team. Your job is to install firewalls to help protect the network, based on specific requirements. The Packet Tracer topology that you will use includes two preconfigured firewalls. In the two scenarios presented, you will replace the existing routers with the firewalls.

The firewalls need to be configured with the appropriate IP address configurations, and the firewalls should be tested to ensure that they are installed and configured correctly. Scenario 1: Protecting the Network from Hackers Because the company is concerned about security, you recommend a firewall to protect the network from hackers on the Internet. It is very important that access to the network from the Internet is restricted. You will install it on the network and confirm that it is functioning as expected.

Use straight-through cables for both connections. Scenario 2: Securing the Research and Development Network Now that the entire network is secured from traffic originating from the Internet, secure the research and development network, Subnet C, from potential breaches from inside the network.

The research and development team needs access to both the server on Subnet B and the Internet to conduct research. Computers on Subnet B should be denied access to the research and development subnet.

Use the show run command to verify the configuration. Why would you install a firewall on the internal network? The company has some new personnel who will be using wireless computers to save money on adding additional networked connections to the building.

The business is concerned about the security of the network because they have financial and highly classified data being transmitted over the network. Your job is to configure the security on the router to protect the data.

In this activity, you will configure WEP security on both a Linksys wireless router and a workstation. Click the Customer Wireless Router icon. Then, click the GUI tab to access the router web management interface. Leave the other settings with their default options. Click the Wireless Security submenu under the Wireless menu to display the current wireless security parameters.

In the Key1 text box, type 1a2b3c4d5e. This will be the new WEP pre-shared key to access the wireless network. Click the Save Settings button at the bottom of the Wireless Security window. Step 2: Configure WEP on the customer wireless workstation. Click the Customer Wireless Workstation. Click the Wireless button to display the current wireless configuration settings on the workstation.

Enter 1a2b3c4d5e in the Key text box, and then close the window. Step 3: Verify the configuration. After you configure the correct WEP key and SSID on the customer wireless workstation, notice that there is a wireless connection between the workstation and the wireless router.

Click the Desktop tab to view the applications that are available. Click on the Command Prompt application to bring up the command prompt. Close the command prompt window. Open a web browser. Press Enter.

The Intranet web page that is running on the customer server appears. You have just verified that the customer wireless workstation has connectivity to the rest of the customer network. What is the purpose of using WEP on a wireless network? What is the significance of the key that you used to secure WEP?

Is WEP the best choice for wireless security? This activity provides you an opportunity to review previously acquired skills. You must establish a console session through PC1. Connect a console cable from PC1 to S1. From PC1, open a terminal window and use the default terminal configuration. You should now have access to the CLI for S1. If not, click Check Results to see which required components are not yet completed. Configure the switch host name as S1. S1 config interface vlan 1 S1 config-if ip address Configure the default gateway for S1 and then test connectivity.

S1 should be able to ping R1. Also, make sure that interface VLAN 1 is active. Step 3: Configure the current time using Help. Configure the clock to the current time. At the privileged EXEC prompt, enter clock?. Use Help to discover the steps required to set the current time. Use the show clock command to verify that the clock is now set to the current time.

Packet Tracer may not correctly simulate the time you entered. Packet Tracer does not grade this command, so the completion percentage does not change.

Step 4: Configure passwords. Use the encrypted form of the privileged EXEC mode password and set the password to class. Configure the passwords for console and Telnet. Set both the console and vty password to cisco and require users to log in. View the current configuration on S1. Notice that the line passwords are shown in clear text. Enter the command to encrypt these passwords. Step 5: Configure the login banner. If you do not enter the banner text exactly as specified, Packet Tracer does not grade your command correctly.

These commands are case-sensitive. Also make sure that you do not include any spaces before or after the text. Configure the message-of-the-day banner on S1 to display as Authorized Access Only. Do not include the period. Step 6: Configure the router. Routers and switches share many of the same commands. Configure the router with the same basic commands you used on S1.

Access the CLI for R1 by clicking the device. PC1 and Server currently do not have access through S1 because the duplex and speed are mismatched. Enter commands on S1 to solve this problem. Step 8: Configure port security. However, all the port security tasks listed above are required to complete this activity successfully. Your output should look like the following output. Notice that S1 has not yet learned a MAC address for this interface. What command generated this output? Send a ping from PC1 to S1.

Test port security. Wait for the link lights to turn green. If necessary, send a ping from PC2 to S1 to cause the port to shut down.

Reconnect PC1 and re-enable the port. Step 9: Secure unused ports. Disable all ports that are currently not used on S1. Step Manage the switch configuration file. Back up the startup configuration file on S1 and R1 by uploading them to Server. Verify that Server has the R1-confg and S1-confg files. You will also examine encapsulation mismatches and learn how to correct the issue. Step 1: Configure PPP encapsulation on serial interfaces. Use the show interface command on any of the serial interfaces to view the current encapsulation.

Observe the effects. What would happen if PPP encapsulation was configured on each end of the serial link? When does the line protocol on the serial link come up?

To verify that PPP is now the encapsulation on the serial interfaces, issue the show interface command for each serial interface. Step 2: Examine the WAN encapsulation mismatches.

Return both serial interfaces on R2 to their default HDLC encapsulation using the encapsulation hdlc command. What happened to the serial interfaces on R2? Return both serial interfaces on R2 to PPP encapsulation. Your completion percentage should be percent. Why is it important to make sure encapsulation across a serial link is identical on both ends?

You will troubleshoot the connectivity problems to determine where the errors are occurring and correct them using the appropriate commands. When all errors have been corrected, each host should be able to communicate with all other configured network elements and with the other host. Step 1: Examine the logical LAN topology. The IP address block of Based on these requirements, the following addressing requirements are provided: Subnet A IP mask decimal Examine each value in the tables and verify that this topology meets all requirements and specifications.

Are any of the given values incorrect? If yes, make note of the corrected values. Step 2: Begin troubleshooting at the host connected to Router1. To determine where the network error occurs, try pinging various devices from Host1. From host PC1, is it possible to ping PC2? From host PC1, is it possible to ping the default gateway?

From host PC1, is it possible to ping itself? Where is the most logical place to begin troubleshooting the PC1 connection problems? Step 3: Examine the router to find possible configuration errors.

Begin by viewing the summary of status information for each interface on the router. Are there any problems with the status of the interfaces? If there are problems, record the commands necessary to correct the configuration errors. Step 4: Implement the necessary corrections to the router configuration. Does the information in the interface status summary indicate any configuration errors on Router1?

If yes, continue troubleshooting the status of the interfaces. Step 5: Verify the logical configuration. Has connectivity been restored? If the hosts cannot ping one another, continue troubleshooting until there is connectivity between the two hosts. Reflection Why is it useful for a host to ping its own address? Several errors in the configuration have resulted in connectivity issues.

Your boss has asked you to troubleshoot and correct the configuration errors and document your work. Make sure all clients have full connectivity. Use troubleshooting commands to discover errors and then correct them. ISP should be able to ping the inside web server at its public IP address.

If not, continue troubleshooting to see which required components are not yet completed. Step 2: Document the corrected network. On each router, issue the show run command and capture the configurations.

Each router makes an independent forwarding decision based on its knowledge of destination paths. Although packets may reach the destination network, the return path may be unknown to the destination router. When this occurs, the router is unable to route traffic back to the source. Ping PC3 from PC1. Note that the ping is not successful.

Use the show ip route command to check the routing table on R1 to determine the problem. Do you see a route in the routing table for Enter a static route on R1 for the destination network R1 configure terminal R1 config ip route Use the show ip route command to check the routing table on R1.

Does the table now have a route to At the command prompt on PC1, ping Change from Realtime to Simulation mode. Select the Simulation tab, located behind Realtime in the lower right corner. Filter the traffic so that only ICMP packets are viewed. In Simulation mode, click the Edit Filters button.

Select the source and destination devices for the simulation. Above the Simulation mode icon, there are two envelope icons. Designate PC3 as the destination host. However, R3 is discarding the packets. What is causing the ping to fail at R3? Exit Simulation mode by clicking on the Realtime mode icon. Step 3: Resolve the routing issue on R3.

Enter a static route on R3 for the destination network R3 configure terminal R3 config ip route Use the show ip route command to check the routing table on R3.

The ping should be successful. If not, retrace your steps and troubleshoot to resolve the problem. Create a new scenario for this second simulation by clicking the New box under Scenario 0.

This changes the drop-down menu to Scenario 1. In Simulation mode, click on the Edit Filters button. R1 is forwarding the reply to PC1. The routing issues have been resolved. Click the Check Results tab to verify that you have correctly completed the activity. Create equal size subnets for each of the individual LANs.

A combination of RIPv2 and static routing is required so that hosts on networks that are not directly connected can communicate with each other. Step 1: Subnet the address space. Assign subnetwork addresses to the topology. Step 2: Determine interface addresses. Assign the first valid host address in the Assign the last valid host address in Assign the last valid host address in the Configure the router host name.

Disable DNS lookup. Configure an EXEC mode password. Configure a message-of-the-day banner. Configure the password cisco for console connections. Configure a password cisco for vty connections.

Step 4: Configure and activate the serial and Fast Ethernet interfaces. Step 5: Verify connectivity to the next hop device. You should not have connectivity between end devices yet. However, you can test connectivity between two routers and between an end device and its default gateway.

List the networks with slash notation. Which commands are required to enable RIPv2 and include the connected networks in the routing updates? Are there any router interfaces that do not need to have RIP updates sent out? If so, disable RIP updates on these interfaces with the appropriate command.

A static default route is needed to send packets with destination addresses that are not in the routing table to HQ. Configure a static default route using the outbound interface. Consider the type of static routing that is needed on HQ. Which networks are present in the HQ routing table? A static default route is needed to send packets with destination addresses that are not in the routing table to ISP. Disable RIP updates on interfaces if necessary. Step 8: Configure static routing on the ISP router.

In a real-world implementation of this topology, you would not be configuring the ISP router. However, your service provider is an active partner in solving your connectivity needs. Service provider administrators are human, and make mistakes. Therefore, it is important that you understand the types of errors an ISP could make that would cause your network to lose connectivity.

Use the outbound interface for the static routing. Which commands are used on the ISP router to accomplish this? Step 9: Verify the configurations. Test the connectivity between the following devices. If any of the pings fail, troubleshoot. If not, continue troubleshooting to determine which required components are not yet completed. What routes are present in the routing table of the HQ router?

What networks are present in the routing table of ISP? You have console access from Net Admin to S2. Some of the network is hidden from you in the network cloud. This includes passwords for access to the console port, vty line and setting a banner message-of-the-day. The first five addresses are excluded from the pool. The Inside Web Server at Security violations automatically disable a port. Note: The activity initially opens with a partial completion percentage.

The steps are a suggested approach to troubleshooting the connectivity issues. Step 1: Test Connectivity a. Document where connectivity fails. Step 2: Access the network through Net Admin.

Notice that the link lights for the LAN connection are red. Use the Net Admin console connection to log in to S2 and troubleshoot the problem. What solution would fix the problem? The solution must match the business requirements. Implement the solution. Close the terminal session on S2. If the connection at S2 is still amber, wait for it to turn green. Open a command prompt on Net Admin. What is the address of the default gateway?

Ping the default gateway. Telnet to the default gateway. Step 4: Investigate R2 connectivity. Use show commands to determine the current state of the configuration on R2. According to the descriptions, which interface connects to the ISP and to R1? What is the status of the serial interfaces?

What routes does R2 have in its routing table? Cisco devices can use a proprietary protocol to gather information about other directly connected Cisco devices. What is this protocol, and is it currently active on R2? Step 5: Restore connectivity to the ISP. What solution would correct the connectivity to the ISP? Implement the solution, and then test connectivity by pinging the ISP address R2 cannot yet ping the Public Web Server. What is the solution?

Implement the solution and make sure that the business requirements for default traffic are taken into account.

R2 should now be able to ping the Public Web Server at www. You will solve these connectivity issues later in the activity. Step 6: Get information about R1. Which command enables the proprietary Cisco protocol on R2 so that you can gather information about other directly connected Cisco devices?

Add the command to the R2 configuration. After it is activated, it may take a few minutes for R2 to receive updates from its directly connected Cisco neighbors.

You should eventually be able to discover the IP address for R1. Which command displays the IP address for R1? What is the R1 IP address? Step 7: Telnet to R1 and solve routing issues. From the R2 command line, telnet to R1.

Use show commands to determine the current state of the configuration on R1. What is the status of the configured interfaces? What routes does R1 have in its routing table? There could be more than one reason for the lack of convergence in the R1 routing table. From the information gathered using show commands, why is the R1 routing table not converged? What solutions would work? Implement the solutions. However, R1 cannot yet ping the ISP.

Step 8: Troubleshoot PC1 connectivity. Is the addressing received from R1 complete and correct according to the business requirements? Implement the appropriate solutions to fix the dynamic configuration on PC1. Make sure that the same current pool name in the configuration is used.

Verify that PC1 now has the correct configuration according to the business requirements. The administrative password is cisco Verify that the configurations on the Basic Setup page match the business requirements. If there is an error, solve it. Use the Linksys Wireless Network Monitor v1.

Currently, none of the end devices can ping the Public Web Server. R2 is the NAT firewall router. Investigate the configuration on R2. According to the business requirements, what are the errors in the NAT configuration? Implement the solutions necessary to fix the errors. Step Verify full end-to-end connectivity. Step 1: You have received the following work order from your manager at the ISP. Review the work order to get a general understanding of what is to be done for the customer.

The new switch will support connections from wired clients on one subnet. The existing Linksys will support wireless clients on another subnet. Configure the as a DHCP server for the wired network and the Linksys which supports wireless users.

The wired and wireless client traffic from each subnet will be routed though the new customer router. The customer, AnyCompany1, has been assigned an IP address and subnet mask: Develop a subnet scheme using this address that will allow the customer network to support two subnets of up to 30 clients each, and allow for growth to as many as 6 subnets in the future. The router IP addresses on the Fast Ethernet ports for both the wired and wireless network will be the first available IP address from the respective subnetwork.

The IP address for the Linksys will be the second available address from the range assigned above. The wireless network clients will use the default internal IP addressing network The internal wireless clients will not require a subnet from the base address. Step 1: Determine the number of hosts and subnets. The largest subnet must be able to support 30 hosts. What is the minimum number of subnets required for the new network design that also allows for future growth?

How many host ID bits are reserved for the subnet ID to allow for this number of subnets with each subnet having 30 hosts? What is the maximum possible number of subnets with this scheme? Now that the number of subnet ID bits is known, the subnet mask can be calculated. A class C network has a default subnet mask of 24 bits, or What will the custom subnet mask be?

Step 3: Identify subnet and host IP addresses. Now that the subnet mask is identified, the network addressing scheme can be created. The addressing scheme includes the subnet numbers; the subnet broadcast address, and the range of IP addresses assignable to hosts. Complete the table showing all the possible subnets for the Step 1: Document the interfaces and Host IP addresses. This information will be used in configuring the customer router.

If you are using a router other than an , use the interface chart at the end of the lab to determine the proper interface designations.

Step 1: Verify default settings for the customer router. The first way is to move the mouse cursor over the Word in the Menu bar and click to open additional menu features. Page File Menu Erases your current Device configuration and then loads the saved Device configuration from your saved files filename.

To do that, select the Load NetMap menu option under the File pull-down menu. Page View Menu Server section for more details. The features of the Remote Control include buttons for quick launching to the Devices along with easy access to the Lab Navigator and the Net Map. Page Devices Menu Permits fast and easy access to the various simulated device command prompts, which are within your simulate network. If there are available updates for any of the components, the program will list them separately and give you the option to easily download and install them.

Once registered, all functionality is unlocked and the full version is fully operational. This option is only to inform you of special offers and other products available from Cisco Press and its partners, by optionally bringing you to the Cisco Press web site. The Lab Navigator also provides the user with a simple way to select the lab they would like to try by simply clicking on the name. You can also use your arrow keys to maneuver through the menu and the Enter key will select the lab or lesson you would like to run.

It is the document you are reading now. Page Virtual Terminal Server Virtual Terminal Server The Virtual Terminal Server permits you to virtually attach to simulated devices and cycle between them without the need for separate telnet sessions. If for some reason you closed the package, just locate the Lab Navigator button on the toolbar in the Simulator. It is here that you will find the text to lead you on your way to performing these labs. Page Lab Topics To print the labs at any time, simply select the print option within the lab PDF itself, after you have launched it from within the Lab Navigator.

They are: 1. Besides the scenario, you are provided with a simple running configuration list illustrating the major points that should be included in your attempts to correctly complete the lab. In order to have a lab that the Grade My Lab feature can accommodate, you must perform the following steps: 1.

Page Network Designer 2. Page 59 To avoid confusion, although not required, it is recommended that you design and create your custom networks in the following sequence until you are familiar with the process: 1. Note: An Add Device Wizard is also available. Adding eRouters The Network Design Topology supports 8 series of routers, , , , , , , , and series.

To add a router to the layout area, simply follow the steps below. The Device Wizard will then guide you through the following selection and configuration process: Select the Device Router, Switch, Station that you would like to add: Depending upon your selection, the screen options will change: If adding a Router, there are 2 ways for how you would like to find the interfaces you require. Page 64 If adding a Router, there are 2 ways for how you would like to find the interfaces you require.

If adding a Switch, simply select the model number from the list. Left click the Device you want to terminate. Choose Delete Device from the pop-up menu. The Network Designer will remove the selected Device from the NetMap Topology layout window, and automatically delete all associated Connectors.

Note: An Add Connector Wizard is also available. To select an Interface Connection Type 1. Left-Click on the Ethernet connection to add. The New Connection box will appear, listing all Devices that have Ethernet ports correlating to the Ethernet connection type that was selected. Left-Click on the Serial connection to add. Note: Frame Relay is configured separately. Click each Available Device to highlight and select it 4. Next, select the router you would like to connect from the Available Devices box 5.

Selecting a Router will cause the Ports list to be populated with all available serial ports for the selected router. Left click the Connection you want to terminate. Choose Remove Connection from the pop-up menu. Select the connection to disconnect. The connection will be removed from the NetMap Topology layout window. Click on the File menu item. Select menu option New, and you will be asked to confirm:. Wipe Out the Entire Network?

The current topology will be erased and cleared. Click the Save option. A window will appear to verify that you have chosen to save the topology. Click the OK button. Click the File menu option. Click the Open option. Browse to the location of your topology file remember, the default file extension for topology files is ". Select the file you would like to open.

Click the Print button from with in the File menu. Here you will be able to select which printer you want to send your image to, and you can click on Preferences to adjust the printing options. Page Norton Personal Firewall Telnet port The above third-party programs were tested only so far as basic compatibility for use with the advanced features of the Cisco CCNA Network Simulator.

No other testing was completed.

 


(PDF) CCNA RS Essentials - Instructor Packet Tracer Manual - - Trending Articles



 

You will learn why a ping may fail the first time later in your studies. If you are unable to ping any of the devices, recheck your configuration for errors. Your tasks include configuring initial settings on two switches using the Cisco IOS and configuring IP address parameters on host devices to provide end-to-end connectivity. Note: Click Check Results to see your progress. Click Reset Activity to generate a new set of requirements.

If you click on this before you complete the activity, all configurations will be lost. Although the tables below show device names mapping to specific address schemes, the names and addresses are not bound together. For example, a student could get the device names shown in Scenario 1 with the addressing shown in Scenario 2. In addition, one of three versions of the topology will be presented to the student. Simulation S mo ode allows you u to view the data contentss being sent a across the netwo ork at each lay yer.

As data moves m through h the network k, it is broken down into sm maller pieces a and identified so that the p pieces can be put bac ck together when w they arrive at the destination. Pa acket Tracer ssimulation mode ena ables you to view v each of the layers and d the associatted PDU. The e following ste eps lead the u user through th he process off requesting a web page fro om a web serrver by using the web brow wser application available on a client PC C.

Even thou ugh much of the t informatio on displayed will w be discusssed in more d detail later, this is an opporrtunity to explore th he functionalitty of Packet Tracer T and be e able to visua alize the enca apsulation pro ocess.

In the low wer right corne er of the Pack ket Tracer inte erface are tab bs to toggle be etween Realttime and Sim mulation mode. PT T always starts s in Realtime e mode, in wh hich networkin ng protocols o operate with rrealistic timing gs. In Simulattion mode, pa ackets are dis splayed as an nimated envellopes, time is event driven, and the use er can step throu ugh networkin ng events.

Click the Simulatio on mode icon n to switch fro om Realtime mode to Simulation mode e. This docume ent is Cisco Publiic. Click Edit Filters to display the available visible events.

Click anywhere outside of the Edit Filters box to hide it. Currently the Simulation Panel is empty. There are six columns listed across the top of the Event List within the Simulation Panel. As traffic is generated and stepped through, events appear in the list. The Info column is used to inspect the contents of a particular event. The panels can be adjusted in size by hovering next to the scroll bar and dragging left or right when the double-headed arrow appears.

Click Web Client in the far left pane. Click the Desktop tab and click the Web Browser icon to open it. In the URL field, enter www. There should be four events in the Event List. Look at the Web Client web browser page. Did anything change? The web page was returned from the web server.

It may be necessary to expand the Simulation Panel or use the scrollbar directly below the Event List. As more events are examined, there will be three tabs displayed, adding a tab for Inbound PDU Details. Ensure that the OSI Model tab is selected. Under the Out Layers column, ensure that the Layer 7 box is highlighted. What is the text displayed next to the Layer 7 label? Click Next Layer. Layer 4 should be highlighted. What is the Dst Port value?

Layer 3 should be highlighted. What is the Dest. IP value? What information is displayed at this layer? With which layer is it associated? What layer would this information be associated with under the OSI Model tab? Only Layer 1 is active not grayed out. The device is moving the frame from the buffer and placing it on to the network.

This window contains both In Layers and Out Layers. Notice the direction of the arrow directly under the In Layers column; it is pointing upward, indicating the direction the information is travelling.

Scroll through these layers making note of the items previously viewed. At the top of the column the arrow points to the right. This denotes that the server is now sending the information back to the client. Comparing the information displayed in the In Layers column with that of the Out Layers column, what are the major differences? Scroll down to the HTTP section.

What is the first line in the HTTP message that displays? Click the last colored square box under the Info column. How many tabs are displayed with this event and why? Step 1: View Additional Events a. Close any open PDU information windows.

What additional Event Types are displayed? It is possible that the ARP entries may not show, depending on what a student may have done prior to going to simulation mode. If the activity is started from scratch all of those will be listed. DNS is responsible for converting a name for example, www. The additional TCP events are responsible for connecting, agreeing on communication parameters, and disconnecting the communications sessions between the devices.

These protocols have been mentioned previously and will be further discussed as the course progresses. Currently there are over 35 possible protocols event types available for capture within Packet Tracer.

Click the first DNS event in the Info column. This is very useful information to help understand what is occurring during the communication process. Click the last DNS Info colored square box in the event list. Which device is displayed?

In the numbered list directly below the In Layers and Out Layers, what is the information displayed under items 4 and 5? The TCP connection is successful. TCP manages the connecting and disconnecting of the communications channel along with other responsibilities. Click the last TCP event. Examine the steps listed directly below In Layers and Out Layers. What is the purpose of this event, based on the information provided in the last item in the list should be item 4?

Challenge This simulation provided an example of a web session between a client and a server on a local area network LAN. The client makes requests to specific services running on the server.

The server must be set up to listen on specific ports for a client request. Based on the information that was inspected during the Packet Tracer capture, what port number is the Web Server listening on for the web request? T This activity uses a comple ex topology an nd a fictitious top level dom main. Page 1 of 5 Packet Tracer - Explore a Network Background This simulation activity is intended to help you understand the flow of traffic and the contents of data packets as they traverse a complex network.

Communications will be examined at three different locations simulating typical business and home networks. Take a few moments to study the topology displayed. The Central location has three routers and multiple networks possibly representing different buildings within a campus. The Branch location has only one router with a connection to both the Internet and a dedicated wide-area network WAN connection to the Central location.

The Home Office makes use of a cable modem broadband connection to provide access to both the Internet and to corporate resources over the Internet. The devices at each location use a combination of static and dynamic addressing. Part 1: Examine Internetwork Traffic at Branch In Part 1 of this activity, you will use Simulation mode to generate web traffic and examine the HTTP protocol along with other protocols necessary for communications.

Step 1: Switching from Realtime to Simulation mode. Click the Simulation mode icon to switch from Realtime mode to Simulation mode. Step 2: Generate traffic using a web browser. In the Event List at the top of the Simulation Panel there are six columns listed across the heading. As traffic is generated and stepped through, events display in the list. Note: The panel to the left of the Simulation Panel displays the topology. Use the scrollbars to bring the Branch location into the panel, if necessary.

The panels can be adjusted in size by hovering next to the scrollbar and dragging left or right. Click the Sales PC in the far left pane. Look in the Event List in the Simulation Panel. What is the first type of event listed? Click the DNS info box. Both the source and destination IP addresses are listed. What information is missing to communicate with the DNS server? The Layer 2 information, specifically the destination MAC address. In approximately 45 seconds, a window displays, indicating the completion of the current simulation.

Click the View Previous Events button. Scroll back to the top of the list and note the number of ARP events. Looking at the Device column in Event list, how many of the devices in the Branch location does the ARP request pass through?

Each device received an ARP request. Page 2 of 5 Packet Tracer - Explore a Network f. Scroll down the events in the list to the series of DNS events. Click the square box in the Info column. Look at the results displayed directly below In Layers.

The name queried resolved locally. Scroll to the bottom of the window and locate the DNS Answer section. What is the address displayed? The next several events are TCP events enabling a communications channel to be established. Click the colored square Info box to display the PDU information.

Highlight Layer 4 in the In Layers column. Looking at item 6 in the list directly below the In Layers column, what is the connection state? Established i. The next several events are HTTP events. How many layers are active at one of these devices, and why? Two layers, because these are Layer 2 devices. Select the uppermost layer from the OSI Model tab. What is the result listed below the In Layers column? It displays the page in the web browser. Step 1: Set up for traffic capture to the Central web server.

Close any open PDU Information windows. Click Reset Simulation located near the middle of the Simulation Panel. Click View Previous Events. Based on what you have learned so far, why is this the case? Click the last DNS event in the Info column. By looking at the information provided, what can be determined about the DNS results? The DNS server was able to resolve the domain name for centralserver. What is the address listed for centralserver. The next several events are ARP events.

Click the colored square Info box of the last ARP event. The R4 Router, the gateway device. The next several events are TCP events, once again preparing to set up a communications channel. Click the colored square box of the HTTP event. What can be determined about the destination MAC address? Page 3 of 5 Packet Tracer - Explore a Network i. Notice that Layer 2 contains an Ethernet II header.

What is the Layer 2 listed at this device? Notice that there are only two active layers, as opposed to three active layers when moving through the router. This is a WAN connection, which will be discussed in a later course. Part 3: Examine Internet Traffic from Branch In Part 3 of this activity, you will clear the events and start a new web request that will make use of the Internet.

Step 1: Set up for traffic capture to an Internet web server. Click Reset Simulation near the middle of the Simulation Panel. Scroll back to the top of the list; notice that the first series of events are DNS.

What do you notice about the number of DNS events? There are considerably more DNS events. Because the DNS entry is not local it is forwarded to a server on the Internet. Where are these devices located? In the Internet Cloud, students should be shown that those devices can be displayed by clicking the cloud and then clicking the Back link to go back. Click the last DNS event.

What is the address listed for www. Based on that information, how many routers are passed through? Based on the information displayed, what is the purpose of this event? To close the TCP connection to There are several more TCP events listed.

Based on the information from the output, what is the connection state set to? This activity will examine device configurations in Packet Tracer, selecting the proper cable based on the configuration, and connecting the devices.

This activity will also explore the physical view of the network in Packet Tracer. At the bottom left, click the orange lightning icon to open the available Connections. Cloud is a type of switch, so use a Copper Straight-Through connection. If you attached the correct cable, the link lights on the cable turn green. Step 2: Connect the cloud to Cable Modem.

Choose the correct cable to connect Cloud Coax7 to Modem Port0. Use one of the available Serial cables. Step 2: Connect Router0 to netacad.

Routers and computers traditionally use the same wires to transmit 1 and 2 and receive 3 and 6. The correct cable to choose consists of these crossed wires. Although many NICs can now autosense which pair is used to transmit and receive, Router0 and netacad. Step 3: Connect Router0 to the Configuration Terminal.

This cable does not provide network access to Configuration Terminal, but allows you to configure Router0 through its terminal. If you attached the correct cable, the link lights on the cable turn black. Allow a few seconds for the light to transition from amber to green. If you attached the correct cable, the link lights on the cable will turn green.

Open the Family PC command prompt and ping netacad. Step 3: Open Router0 from Configuration Terminal. Open the Terminal of Configuration Terminal and accept the default settings. Press Enter to view the Router0 command prompt. Type show ip interface brief to view interface statuses.

Click the Home City icon. Click the Cloud icon. How many wires are connected to the switch in the blue rack? Click Back to return to Home City. Step 2: Examine the Primary Network. Click the Primary Network icon. Hold the mouse pointer over the various cables.

What is located on the table to the right of the blue rack? Configuration Terminal b. Step 3: Examine the Secondary Network.

Click the Secondary Network icon. Why are there two orange cables connected to each device? Fiber cables come in pairs, one for transmit, the other for receive. Why is there an oval mesh covering the home network? It represents the range of the wireless network. Click the Home Network icon. Why is there no rack to hold the equipment? Home networks typically do not have racks.

Click the Logical Workspace tab to return to the logical topology. The devices are already configured. You will gather PDU information in simulation mode and answer a series of questions about the data you collect. It will give you an idea of the types of information you will need to gather. Step 1: Gather PDU information as a packet travels from Click Enter the ping Switch to simulation mode and repeat the ping A PDU appears next to Gather the same information from Step 1d.

Repeat this process until the PDU reaches its destination. Part 2: Reflection Questions Answer the following questions regarding the captured data: 1. Were there different types of wires used to connect devices? Yes, copper and fiber 2. Did the wires change the handling of the PDU in any way?

Did the Hub lose any of the information given to it? Nothing 5. Did the wireless Access Point do anything with the information given to it? It repackaged it as wireless Layer 1 8. Yes 9. Why would the MAC addresses appear in this order? A switch can begin forwarding a frame to a known MAC address more quickly if the destination is listed first Was there a pattern to the MAC addressing in the simulation?

No Every time that the PDU was sent between the 10 network and the network, there was a point where the MAC addresses suddenly changed. Where did that occur? It occurred at the Router Which device uses MAC addresses starting with 00D0?

The Router To what devices did the other MAC addresses belong? To the sender and receiver If you follow the reply to a ping, sometimes called a pong, do the sending and receiving IPv4 addresses switch?

Yes What is the pattern to the IPv4 addressing in this simulation? Each port of a router requires a set of nonoverlapping addresses Why do different IP networks need to be assigned to different ports of a router? The function of a router is to inter-connect different IP networks. If this simulation was configured with IPv6 instead of IPv4, what would be different? The IPv4 addresses would be replaced with IPv6 addresses, but everything else would be the same.

Suggested Scoring Rubric There are 20 questions worth 5 points each for a possible score of Enter the arp -d command to clear the ARP table. Enter Simulation mode and enter the command ping Two PDUs will be generated. Is this address listed in the table above? Step 5: View the header information of the packets that traveled across the network a Examine the headers of the packets sent between the PC and the web server.

In the Simulation Panel, double click the third line down in the Event List. This displays an envelope in the work area that represents that line. Click the envelope in the work area window to view the packet and header information. This is because the activity is designed to demonstrate the flow of packets between a PC and a web server. This address is obtained from the DNS server. All traffic forwarded across the network uses IP address information. Step 2: Connect to the web server a From the desktop window, access the web browser.

Leave this page open. This may require that you re-maximize the External Client window if it shrunk when you opened the server window. Step 4: Observe traffic between the client and the web server a Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner.

Click the External Client to specify it as the source. The complex PDU window will appear. Notice the IP address of the web server will appear in the destination box within the complex PDU window. Notice the number of packets that traveled from source to destination. HTTP is a TCP protocol, which requires connection establishment and acknowledgement of receipt of packets, considerably increasing the amount of traffic overhead.

This is because the activity is designed to demonstrate the flow of traffic between a client and a server. Step 1: Observe traffic between a client and a web server a Enter Simulation mode by clicking the Simulation tab in the lower right-hand corner. Step 2: View the header information of the packets that traveled across the network a Examine the headers of the packets sent between the clients and server.

In the Simulation Panel, click any one of the lines in the Event List. A switch will only display the packet to Layer 2. Whereas, the PC or Server will display the packet up to Layer 4. In the OSI Model window, read the description of the packet. Background A small business owner cannot connect to the Internet with one of the four PCs in the office. All of the PCs are configured with static IP addressing.

Step 2: Correct any misconfigurations a Select the PC that is incorrectly configured and access the Config tab. Background A small business owner learns that the user of PC2 is unable to access a website. All PCs are configured with static IP addressing.

Use the ping command to identify the issue. Please allow up to one minute before receiving a web response. What is the IP address returned, if any? If so, then PC2 is able to reach the web server via IP address, but not domain name. Do the two configurations match? Background A small business owner learns that a wireless user is unable to access the network. All devices are configured with static addressing. Identify and correct the issue.

Identify any devices that are not connecting to the web server. Step 2: Examine IP configuration of devices. Are they enabled?

What is the SSID? Does it match that configured on the client? New modules can also. A terminal emulator, the command prompt and a simulated web browser can also be accessed using the Desktop tab. Page 3 of 4. Step 1: Overview of the devices. The standard lab setup will consist of two routers, one switch, one server, and two PCs. Each of these devices will be pre-configured with such information as device names, IP addresses, gateways, and connections.

Page 4 of 4. Page 1 of 3. In this activity you will continue learning how to build and analyze this standard lab topology.

If you have not done so already, you are encouraged to examine the Help files available from the Help Pull-down menu at the top of the Packet Tracer GUI.

Resources include an "My First PT Lab" to help you learn the basic operation of Packet Tracer, tutorials to guide you through various tasks, and information on the strengths and limitations of using Packet Tracer to model networks.

Task 1: Complete the Topology. Add a PC to the workspace. Configure it the following parameters: IP Address Note that this packet will appear in the event list as something that was "detected" or "sniffed" on the network, and in the lower right as a user created PDU that can be manipulated for testing purposes. Switch to simulation mode. Click on the packet envelope, or on the colored square in the Info column of the Event List, to examine the packet at each step in its journey.

Page 2 of 3. Each of these devices are pre-configured. Try creating different combinations of test packets and analyzing their journey through the network. Page 3 of 3. Page 1 of 2. At the end of each chapter, you will build increasingly larger parts of this topology in Packet Tracer. Task 1: "Repair" and Test the Topology. Add a PC with a display name of 1B to the topology.

Configure it with the following settings: IP Address Turn on web services on the server by enabling HTTP. Verify your work using feedback from the Check Results button and the Assessment Items tab. The first time you issue this one-shot ping message, it will show as Failed--this is because of the ARP process which will be explained later.

This time it will be successful. In Packet Tracer, the term "scenario" means a specific configuration of one or more test packets. You can create different test packet scenarios by using the New button--for example Scenario 0 might have one test packet from PC 1B to Eagle Server; Scenario 1 might have test packets between PC 1A and the routers; and so on.

You can remove all test packets in a particular scenario by using the Delete button. For example, if you use the Delete button for Scenario 0 the test packet you just created between PC 1B and Eagle Server will be removed--please do this prior to the next task. Switch from Realtime to Simulation mode.

Open a web browser from the desktop of PC 1B. Type in eagle-server. While the processing of the packets by the switch and the routers may not make sense to you yet, you should be able to see how DNS and HTTP work together. Reflection Can you now explain the process that occurs when you type a URL into a browser and a web page returns?

What types of client-server interactions are involved? Page 2 of 2. At the end of each chapter, you will build increasingly larger parts of this topology in Packet Tracer, and analyze increasingly more complex protocol interactions.

Task 1: Repair and Test the Topology. The server has been replaced. It must be powered on. Then configure it with the following settings: IP Address PC 1A has lost its IP address information.

You can create different test packet scenarios by using the New button--for example Scenario 0 might have one test packet from PC 1A to Eagle Server; Scenario 1 might have test packets between PC 1B and the routers; and so on.

For example, if you use the Delete button for Scenario 0 the test packet you just created between PC 1A and Eagle Server will be removed--please do this prior to the next task. Open a web browser from the desktop of 1A. Type in the URL eagle-server. Reflection Can you make a diagram of the sequence of protocol events involved in requesting a web page using a URL? Where might things go wrong? You may have noticed that regardless of what application and transport protocols were involved, in Inbound and Outbound PDU Details view they were always encapsulated in IP Packets.

In this activity we will examine how the Internet Protocol, the dominant network layer protocol of the Internet, works in the context of a simple example of IP routing. Task 1: Configure a Router Interface.

It appears there is a problem with the router. This interface must have an IP address, subnet mask, and be turned on in order to act as the default gateway for the LAN. Click on router R2-Central, and go to the Config tab. For now, the Config tab is easier and will allow you to focus on the basic idea of IP routing. Add the IP address Close the router window. Verify that the router interface port is now working by using the mouse over.

Try reaching Eagle Server. The request still fails. Step 7: Verify the configuration. The first one or two pings may fail while ARP converges. CustomerSwitch config end CustomerSwitch ping What command is necessary to enforce password authentication on the console and vty lines? How many gigabit ports are available on the Cisco Catalyst switch that you used in the activity?

The switch is already configured with all the basic necessary information for connecting to the LAN at the customer site. The switch is currently not connected to the network. You will connect the switch to the customer workstation, the customer server, and customer router. You will verify that the switch has been connected and configured successfully by pinging the LAN interface of the customer router.

Step 1: Connect the switch to the LAN. Step 2: Verify the switch configuration. From the Customer PC, use the terminal emulation software to connect to the console of the customer Cisco Catalyst switch.

Use the console connection and terminal utility on the Customer PC to verify the configurations. Use cisco as the console password. Enter privileged EXEC mode and use the show running-config command to verify the following configurations.

The password is cisco Verify IP connectivity between the Cisco Catalyst switch and the Cisco router by initiating a ping to What is the significance of the enable secret command compared to the enable password? If you want to remove the requirement to enter a password to access the console, what commands do you issue from your starting point in privileged EXEC mode?

Because CDP operates at Layer 2, only directly connected devices exchange information. Step 1: View CDP configuration settings. On router R1, issue the show cdp command. The output shows timer and version information. Issue the show cdp?

Issue the show cdp interface command. The output shows timer information for all the interfaces on the router. You can specify a particular interface to show timer information for that interface only.

Step 2: View CDP neighbor information. A router builds a table of information about neighboring devices from CDP messages received from those devices. On router R1, issue the show cdp neighbors command. Packet Tracer operates in real time, like actual network equipment.

If you do not see two entries in the output of the command, wait a couple of minutes and reissue the command until you do. Examine the output. A single line of information is displayed for each device.

Information is displayed for switch S1 and router R2, which are directly connected, but not for router R3, which is not directly connected.

Issue the show cdp entry R2 command. More detailed information about router R2 is displayed, including the IP address used to reach the router. Detailed information about all directly connected devices is displayed. Issue the show cdp neighbors detail command. Step 3: Disable and enable CDP globally on a router. On router R2, issue the show cdp neighbors command. The output shows information about the three directly connected devices.

Issue the no cdp run command to disable CDP on the router. Exit configuration mode and issue the show cdp neighbors command. The output shows that CDP is not enabled. If the output shows an entry for R2, wait the number of seconds shown for the Holdtime entry on R2, and then reissue the command.

The entry for R2 will no longer be shown because no CDP messages were received before the Holdtime expired. On router R2, enter global configuration mode. Issue the cdp run command to enable CDP on the router. Step 4: Disable and enable CDP on an interface. You may not want to send CDP information to Cisco devices on an untrusted network. It is possible to disable CDP on a specific interface.

Exit configuration mode. Reflection You now have a basic understanding of CDP. Write down some issues and considerations to discuss with your classmates about CDP. Each device in this network has been configured with IP addresses; however, no routing has been configured. The company management wants to use static routes to connect the multiple networks. Step 1: Test connectivity between the PCs and the default gateway. To determine if there is connectivity from each PC to its configured gateway, first use a simple ping test.

From the command prompt, type the ipconfig command. Note the IP address for BOpc and the default gateway address. Ping This ping should be successful. Note the IP address for PNpc and the default gateway address. Each of these ping tests should be successful. Step 2: Ping between routers to test connectivity. Use a console cable and terminal emulation software on BOpc to connect to BranchOffice.

Test connectivity with MainOffice by pinging This ping should succeed. This ping should fail. Issue the show ip route command from the terminal window of BOpc. Note that only directly connected routes are shown in the BranchOffice routing table. The ping to Repeat steps a through d on the other two PCs. The pings to directly connected networks will succeed. However, pings to remote networks will fail.

What steps must be taken to reach all the networks from any PC in the activity? Step 3: Viewing the routing tables. You can view routing tables in Packet Tracer using the Inspect tool. The Inspect tool is in the Common Tools bar to the right of the topology. The Inspect tool is the icon that appears as a magnifying glass. In the Common Tools bar, click on the Inspect tool. Click the MainOffice router and choose Routing Table.

Click the BranchOffice router and choose Routing Table. Click the PartnerNet router and choose Routing Table. Move the routing table windows around so that you can see all three at once. What networks do each of the routers already know about? Does each router know how to route to all networks in the topology? After comparing the routing tables, close the window for each routing table by clicking the x in the upper right corner of each window. To configure static routes for each router, first determine which routes need to be added for each device.

For the BranchOffice and the PartnerNet routers, a single default route allows these devices to route traffic for all networks not directly connected. To configure a default route, you must identify the IP address of the next hop router, which in this case is the MainOffice router. From the Common toolbar, click the Select tool. Move the cursor over the red serial link between the BranchOffice router and the MainOffice router.

Move the cursor over the red serial link between the PartnerNet router and the MainOffice router. At the BranchOffice prompt, type configure terminal. The syntax for a default route is ip route 0. Type ip route 0. Type end to get back to the BranchOffice prompt. Type copy run start to save the configuration change. Repeat steps f through k on the PartnerNet router, using Step 5: Configure static routes at Main Office.

The MainOffice router knows only about routes to the Static routes to the At the MainOffice prompt, type configure terminal. Type end to return to the MainOffice prompt. Repeat steps a through e from Step 3. View the routing tables and notice the difference in the routing tables.

Step 6: Test connectivity. Now that each router in the topology has static routes configured, all hosts should have connectivity to all other hosts. Use ping to verify connectivity.

Click BOpc and click the Desktop tab. Choose the Command prompt option. The ping should be successful, verifying that the static routes are configured properly. Notice that the result is successful even though you did not specifically add the Because a default route was used on the BranchOffice and PartnerNet routers, a route for the The default route sends all traffic destined off network to the MainOffice router.

The In this activity, you will configure RIP across the network and set up end devices to communicate on the network.

Set the clock rate at Using the no shutdown command, enable the configured interfaces. Configure RIP to advertise the networks for the configured interfaces. Configure the end devices. Specify the appropriate default gateway and subnet mask.

At the command prompt for each router, issue the commands show ip protocols and show ip route to verify RIP routing is fully converged. The show ip protocols command displays the networks the router is advertising and the addresses of other RIP routing neighbors.

Every device should now be able to successfully ping any other device in this activity. The business has grown and includes a research and development department working on a new, very confidential project.

The livelihood of the project depends on protecting the data used by the research and development team. Your job is to install firewalls to help protect the network, based on specific requirements. The Packet Tracer topology that you will use includes two preconfigured firewalls. In the two scenarios presented, you will replace the existing routers with the firewalls. The firewalls need to be configured with the appropriate IP address configurations, and the firewalls should be tested to ensure that they are installed and configured correctly.

Scenario 1: Protecting the Network from Hackers Because the company is concerned about security, you recommend a firewall to protect the network from hackers on the Internet. It is very important that access to the network from the Internet is restricted. You will install it on the network and confirm that it is functioning as expected. Use straight-through cables for both connections. Scenario 2: Securing the Research and Development Network Now that the entire network is secured from traffic originating from the Internet, secure the research and development network, Subnet C, from potential breaches from inside the network.

The research and development team needs access to both the server on Subnet B and the Internet to conduct research. Computers on Subnet B should be denied access to the research and development subnet. Use the show run command to verify the configuration. Why would you install a firewall on the internal network? The company has some new personnel who will be using wireless computers to save money on adding additional networked connections to the building.

The business is concerned about the security of the network because they have financial and highly classified data being transmitted over the network. Your job is to configure the security on the router to protect the data. In this activity, you will configure WEP security on both a Linksys wireless router and a workstation. Click the Customer Wireless Router icon.

Then, click the GUI tab to access the router web management interface. Leave the other settings with their default options.

Click the Wireless Security submenu under the Wireless menu to display the current wireless security parameters. In the Key1 text box, type 1a2b3c4d5e. This will be the new WEP pre-shared key to access the wireless network. Click the Save Settings button at the bottom of the Wireless Security window. Step 2: Configure WEP on the customer wireless workstation. Click the Customer Wireless Workstation. Click the Wireless button to display the current wireless configuration settings on the workstation.

Enter 1a2b3c4d5e in the Key text box, and then close the window. Step 3: Verify the configuration. After you configure the correct WEP key and SSID on the customer wireless workstation, notice that there is a wireless connection between the workstation and the wireless router. Click the Desktop tab to view the applications that are available. Click on the Command Prompt application to bring up the command prompt. Close the command prompt window.

Open a web browser. Press Enter. The Intranet web page that is running on the customer server appears. You have just verified that the customer wireless workstation has connectivity to the rest of the customer network.

What is the purpose of using WEP on a wireless network? What is the significance of the key that you used to secure WEP? Is WEP the best choice for wireless security?

This activity provides you an opportunity to review previously acquired skills. You must establish a console session through PC1. Connect a console cable from PC1 to S1. From PC1, open a terminal window and use the default terminal configuration.

You should now have access to the CLI for S1. If not, click Check Results to see which required components are not yet completed. Configure the switch host name as S1. S1 config interface vlan 1 S1 config-if ip address Configure the default gateway for S1 and then test connectivity. S1 should be able to ping R1. Also, make sure that interface VLAN 1 is active.

Step 3: Configure the current time using Help. Configure the clock to the current time. At the privileged EXEC prompt, enter clock?. Use Help to discover the steps required to set the current time. Use the show clock command to verify that the clock is now set to the current time. Packet Tracer may not correctly simulate the time you entered.

Packet Tracer does not grade this command, so the completion percentage does not change. Step 4: Configure passwords. Use the encrypted form of the privileged EXEC mode password and set the password to class. Configure the passwords for console and Telnet. Set both the console and vty password to cisco and require users to log in.

View the current configuration on S1. Notice that the line passwords are shown in clear text. Enter the command to encrypt these passwords. Step 5: Configure the login banner. If you do not enter the banner text exactly as specified, Packet Tracer does not grade your command correctly. These commands are case-sensitive. Also make sure that you do not include any spaces before or after the text. Configure the message-of-the-day banner on S1 to display as Authorized Access Only. Do not include the period.

Step 6: Configure the router. Routers and switches share many of the same commands. Configure the router with the same basic commands you used on S1. Access the CLI for R1 by clicking the device. PC1 and Server currently do not have access through S1 because the duplex and speed are mismatched. Enter commands on S1 to solve this problem. Step 8: Configure port security. However, all the port security tasks listed above are required to complete this activity successfully.

Your output should look like the following output. Notice that S1 has not yet learned a MAC address for this interface.

What command generated this output? Send a ping from PC1 to S1. Test port security. Wait for the link lights to turn green. If necessary, send a ping from PC2 to S1 to cause the port to shut down. Reconnect PC1 and re-enable the port. Step 9: Secure unused ports. Disable all ports that are currently not used on S1. Step Manage the switch configuration file. Back up the startup configuration file on S1 and R1 by uploading them to Server.

Verify that Server has the R1-confg and S1-confg files. You will also examine encapsulation mismatches and learn how to correct the issue. Step 1: Configure PPP encapsulation on serial interfaces. Use the show interface command on any of the serial interfaces to view the current encapsulation. Observe the effects. What would happen if PPP encapsulation was configured on each end of the serial link? When does the line protocol on the serial link come up?

To verify that PPP is now the encapsulation on the serial interfaces, issue the show interface command for each serial interface.

   


No comments:

Post a Comment

- Everything you need to know about SketchUp -

Looking for: Free license sketchup pro 2015 free. Please wait while your request is being verified...  Click here to DOWNLOAD       Fr...